Important Announcement from GMs

Attention WYDians!

Please be informed that due to the alarming numbers of hacking and scamming reports
among players, we strictly prohibit sharing of accounts information to anyone
for those who will report about being hacked but the account is shared we will
give both sanctions to the reporter and the hacker.

Management Policy no. 7

Hack Cases

Always remember that your account is your responsibility. You must be responsible enough to protect your account against such hack cases. Please read the Hack Prevention section and familiarize yourself with the different methods of hacking

7-1 Hacking
ⓐ Joint ownership of accounts
As a means to quickly level a character, users create a joint account. The other person may suddenly change the password of the account after he/she has deleted a character. Things clearly become more complicated when having a joint account because you don’t have the sole ownership of the account.

ⓑ Exchanging of Accounts
After users inside the game have exchanged other people accounts, and in case the motive of the exchange was hacking, the accounts used will be disconnected instantly after being verified of hacking. Sometimes these hackers assume a false name. GMs have the access to find out the information of accounts and all transactions that occur. The users must keep in mind that GMs don’t ask for customers’ account information.

ⓒ Exposure of Password
Be responsible in protecting your password. Never share your passwords to your friends, relatives and others. Account Information must always be kept confidential. Revealing your password might lead to hacking- items and characters lost. You must always pay attention to anyone that might hack your accounts so be extra careful and vigilant.

ⓓ Hacking Tool
A lot of hacking programs have sprouted in the net. These devices will enter your PC discreetly and these hacking tools can be obtained by visiting certain sites with viruses. When your PC has a weak security and anti-virus system, the hacking program will enter and embed itself in your Active X. Once established, the one who sent you that hacking tool will be able to see your personal information and passwords in your PC.

Thank you for understanding.

Leave a comment